SIF (Snapshot Inspection & File Finder) is a tool designed to retrieve historical URLs from the Wayback Machine and check for available snapshots of files with specific extensions. It helps security researchers and penetration testers discover potentially sensitive files that have been archived.
- Fetches URLs from the Wayback Machine for a given domain.
- Checks for available snapshots of the extracted URLs.
- Identifies files with extensions like
.xls,.xml,.json,.pdf,.sql,.docx,.zip,.tar.gz,.log,.db, etc. - Displays snapshot availability and provides direct archive links.
- Supports scanning a single domain or a list of domains from a file.
Ensure you have Python 3 installed. Then, install the required dependencies:
pip install requestsClone this repository
git clone https://github.com/Aceproulx/sif.gitRun SIF using the command line:
python sif.py -d example.compython sif.py -list domains.txtdomains.txtshould contain one domain per line.
You can stop execution at any time using CTRL + C. The script handles interruptions gracefully.
Fetching URLs from Wayback Machine for example.com...
Checking for matching files...
π https://example.com/backup.sql β
(Snapshot Available) π https://web.archive.org/web/20220101010101/https://example.com/backup.sql
π https://example.com/secret.json β (No Snapshot)
Done!
- The tool relies on the Wayback Machine for historical data; results may vary.
- It is intended for educational and security research purposes only.
π Created by Mike Masanga